Home > Mathematics home > Research > Profile > Publications
  1. Published

    (e, 2e) reactions in helium: calculations with correlated wavefunctions

    Furtado, F. M. & O'Mahony, P. F., 1987, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 20, 13, p. L405

    Research output: Contribution to journalArticlepeer-review

  2. Published

    (e,2e) triple differential cross sections for the simultaneous ionization and excitation of helium

    Dupre, C., Lahmam-Bennani, A., Duguet, A., Mota-Furtado, F., O'Mahony, P. F. & Cappello, C. D., 1992, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 25, 1, p. 259

    Research output: Contribution to journalArticlepeer-review

  3. Published

    2D problems in groups

    Kar, A. & Nikolov, N., 13 Jan 2018, In: arXiv.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A 2-isomorphism theorem for delta-matroids

    Moffatt, I. & Oh, J., May 2021, In: Advances in applied mathematics. 126, 102133.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Birch-Goldbach theorem

    Brüdern, J., Dietmann, R., Liu, J. Y. & Wooley, T. D., 2010, In: Archiv der Mathematik. 94, 1, p. 53-58 6 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A bound on the size of separating hash families

    Blackburn, S. R., Etzion, T., Stinson, D. R. & Zaverucha, G. M., Oct 2008, In: Journal of Combinatorial Theory, Series A. 115, 7, p. 1246-1256 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  10. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A characterization for sparse epsilon-regular pairs

    Gerke, S. & Steger, A., 3 Jan 2007, In: The Electronic Journal of Combinatorics. 14, 1, p. - 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    A combinatorial method for calculating the moments of Lévy area

    Levin, D. & Wildon, M., 24 Jul 2008, In: Transactions of the American Mathematical Society. 360, 12, p. 6695-6709 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    A combinatorial proof of a plethystic Murnaghan--Nakayama rule

    Wildon, M., 16 Aug 2016, (E-pub ahead of print) In: SIAM Journal on Discrete Mathematics. 30, 3, p. 1526–1533 108 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A comparative study on the spin asymmetry and integrated cross sections for the electron-impact ionization of atomic hydrogen

    Berakdar, J., O'Mahony, P. F. & Mota-Furtado, F., 1997, In: Zeitschrift für Physik D Atoms, Molecules and Clusters. 39, 1, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    A comparison of the entanglement measures negativity and concurrence

    Verstraete, F., Audenaert, K., Dehaene, J. & De Moor, B., 2001, In: Journal of Physics A: Mathematical and General. 34, 47, p. 10327-10332 6 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    A constructive proof of the existence of Viterbi processes

    Lember, J. & Koloydenko, A., Apr 2010, In: IEEE Transactions on Information Theory. 56, 4, p. 2017-2033 17 p.

    Research output: Contribution to journalArticlepeer-review

  30. Submitted

    A continuity bound for the expected number of connected components of a random graph: a model for epidemics

    Audenaert, K., Hanson, E. & Datta, N., 13 Dec 2019, (Submitted) In: ArXiv.org. 1912, 05599

    Research output: Contribution to journalArticlepeer-review

  31. Published

    A contraction theorem for the largest eigenvalue of a multigraph

    McKee, J., 15 Nov 2018, In: Linear Algebra and Its Applications. 557, p. 339-349 11 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    A Correlation Coprocessor for Accurate Real-Time Ultrasonic Ranging of Multiple Objects Using the Transputer

    Brunfaut, M., Peremans, H., Audenaert, K., Blomme, R. & Van Campenhout, J. M., 1993, In: Microprocessors and Microsystems. 17, 10, p. 571-578

    Research output: Contribution to journalArticlepeer-review

  33. Published

    A critical review of the epidemiological evidence of effects of air pollution on dementia, cognitive function and cognitive decline in adult population

    Delgado-Saborit, J. M., Guercio, V., Gowers, A. M., Shaddick, G., Fox, N. C. & Love, S., 25 Feb 2021, In: Science of The Total Environment. 757, 143734.

    Research output: Contribution to journalReview articlepeer-review

  34. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In: Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Unpublished

    A Determinantal Inequality for the Geometric Mean with an Application in Diffusion Tensor Imaging

    Audenaert, K., 25 Feb 2015, (Unpublished) In: ArXiv.org. 1502.06902, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  39. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In: International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In: Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticlepeer-review

  48. Unpublished

    A generalisation of Mirsky's singular value inequalities

    Audenaert, K., 21 Oct 2014, (Unpublished) In: ArXiv.org. 1410.4941

    Research output: Contribution to journalArticle

  49. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In: Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    A Generalized SXP Rule Proved by Bijections and Involutions

    Wildon, M., Dec 2018, In: Annals of combinatorics. 22, 4, p. 885-905 21 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2006, Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  54. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In: Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticlepeer-review

  55. Published

    A Gutzwiller trace formula for large hermitian matrices

    Bolte, J., Egger, S. & Keppeler, S., 2017, In: Reviews in Mathematical Physics. 29, 8

    Research output: Contribution to journalArticlepeer-review

  56. Published

    A high-resolution sensor based on tri-aural perception

    Peremans, H., Audenaert, K. & Van Campenhout, J. M., 1993, In: Robotics and Automation, IEEE Transactions on. 9, 1, p. 36-48 13 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    A Lieb-Thirring inequality for singular values

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 11, p. 3053-3057 5 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In: The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In: BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In: IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    A model of point configurations given by a semi-parametric interaction

    Grabarnik, P. & Shcherbakov, V., 2012, In: Moscow University Mathematics Bulletin. 67, 2, p. 47-51

    Research output: Contribution to journalArticlepeer-review

  64. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In: European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticlepeer-review

  66. Published

    A new mean-value result for Dirichlet L-functions and polynomials

    Harman, G., Watt, N. & Wong, K., 2004, In: Quarterly J. Math. Oxford,. 55, p. 307-324 18 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    A NEW PROOF THAT ALTERNATING LINKS ARE NON-TRIVIAL

    Moffatt, I., Jun 2010, In: Journal of knot theory and its ramifications. 19, 6, p. 821-828 8 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published
  69. Published

    A non-abelian free pro-p group is not linear over a local field

    Barnea, Y. & Larsen, M., 1 Apr 1999, In: Journal of Algebra. 214, 1, p. 338-341 4 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    A norm compression inequality for block partitioned positive semidefinite matrices

    Audenaert, K. M. R., 2006, In: Linear Algebra and Its Applications. 413, 1, p. 155-176 22 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    A norm inequality for pairs of commuting positive semidefinite matrices

    Audenaert, K., 16 Feb 2015, In: Electronic Journal of Linear Algebra. 30, p. 80-84 5 p., 5.

    Research output: Contribution to journalArticlepeer-review

  72. E-pub ahead of print

    A Note on Bounded Exponential Sums

    Fregoli, R., 11 Nov 2020, (E-pub ahead of print) In: Bulletin of the London Mathematical Society. 10 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In: Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticlepeer-review

  75. Published

    A note on generators of number fields

    Widmer, M. & Vaaler, J., 2012, In: Contemporary Mathematics. 587

    Research output: Contribution to journalArticlepeer-review

  76. E-pub ahead of print

    A note on recognizing an old friend in a new place: list coloring and the zero-temperature Potts model

    A. Ellis-Monaghan, J. & Moffatt, I., 31 Dec 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 4, p. 429–442 14 p.

    Research output: Contribution to journalArticlepeer-review

  77. Unpublished

    A note on scaling limits for truncated birth-and-death processes with interaction

    Shcherbakov, V. & Yambartsev, A., 2016, (Unpublished) In: ArXiv.org.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    A note on the metrical theory of continued fractions

    Harman, G. & Wong, K. C., 2000, In: American Mathematical Monthly. 107, p. 834-837 4 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    A note on the Mittag–Leffler condition for Bredon-modules

    Fluch, M. G., Gandini, G. & Nucinkis, B., Feb 2017, In: Archiv der Mathematik. 108, 2, p. 133–143 11 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    A note on the Möbius and Liouville functions

    Harman, G., Pintz, J. & Wolke, D., 1985, In: Studia Sci. Math. Hung.. 20, p. 295-299 5 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    A note on the number of divisors of quadratic polynomials, in Sieve Methods

    McKee, J., 1997, Exponential Sums and their Applications in Number Theory. Cambridge University Press, p. 275-281

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    A note on the p->q norms of 2-positive maps

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 4, p. 1436-1440 5 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    A Penrose polynomial for embedded graphs

    A. Ellis-Monaghan, J. & Moffatt, I., 2013, In: European Journal of Combinatorics. 34, 2, p. 424-445

    Research output: Contribution to journalArticlepeer-review

  86. Published

    A permanent formula for the Jones polynomial

    Loebl, M. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 659-667 9 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    A point-distribution index and its application to sensor-grouping in wireless sensor networks

    Zhou, Y., Yang, H., Lyu, M. R. & Ngai, EC-H., 1 Jan 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. Vol. 2006. p. 1171-1176 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  89. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  91. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A probabilistic counting lemma for complete graphs

    Gerke, S., Marciniszyn, M. & Steger, A., Dec 2007, In: Random Structures and Algorithms. 31, 4, p. 517-534 18 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    A problem in the metric theory of Diophantine approximation

    Harman, G., 1986, In: Quart. J. Math. Oxford (2). 37, p. 391-400 10 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    A problem of Hooley in Diophantine approximation

    Harman, G., 1996, In: Glasgow Math. J.. 38, p. 299-308 10 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    A Proof of the Murnaghan–Nakayama Rule Using Specht Modules and Tableau Combinatorics

    Kochhar, J. & Wildon, M., 20 Feb 2020, In: Annals of combinatorics. p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  99. E-pub ahead of print

    A Random Walk on the Indecomposable Summands of Tensor Products of Modular Representations of SL2 (Fp)

    McDowell, E., 12 Mar 2021, (E-pub ahead of print) In: Algebras and Representation Theory.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    A representation of a family of secret sharing matroids.

    Ng, S-L., 2003, In: Designs, Codes and Cryptography. 30, p. 5-19 15 p.

    Research output: Contribution to journalArticlepeer-review

  103. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In: IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticlepeer-review

  104. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published
  107. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    A sharp continuity estimate for the von Neumann entropy

    Audenaert, K. M. R., 2007, In: Journal of Physics A: Mathematical and Theoretical. 40, 28, p. 8127-8136 10 p.

    Research output: Contribution to journalArticlepeer-review

  109. Published

    A simple necessary decoherence condition for a set of histories

    Scherer, A., Soklakov, A. N. & Schack, R., 2004, In: Physics Letters A. 326, p. 307 1 p.

    Research output: Contribution to journalArticlepeer-review

  110. Published

    A singular value inequality for Heinz means

    Audenaert, K. M. R., 2007, In: Linear Algebra and Its Applications. 422, 1, p. 279-283 5 p.

    Research output: Contribution to journalArticlepeer-review

  111. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In: International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticlepeer-review

  114. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    A trace bound for positive definite connected integer symmetric matrices

    McKee, J. & Yatsyna, P., 1 Mar 2014, In: Linear Algebra and Its Applications. 444, p. 227-230 4 p.

    Research output: Contribution to journalArticlepeer-review

  117. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  119. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In: Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticlepeer-review

  122. Published

    Abstract commensurators of profinite groups

    Barnea, Y., Ershov, M. & Weigel, T., Oct 2011, In: Transactions of the American Mathematical Society. 363, 10, p. 5381-5417 37 p.

    Research output: Contribution to journalArticlepeer-review

  123. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F., 2006, Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In: South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticlepeer-review

  127. Published

    Accurate ranging of multiple objects using ultrasonic sensors: Proceedings. IEEE International Conference on Robotics and Automation, 1992.

    Audenaert, K., Peremans, H., Kawahara, Y. & Van Campenhout, J., 1992.

    Research output: Contribution to conferenceOther

  128. Published

    Action of generalized symmetric groups on symmetric and exterior powers of their natural representations

    O'Donovan, W., 2017, In: COMMUNICATIONS IN ALGEBRA. 45, 3, p. 1314-1322 9 p.

    Research output: Contribution to journalArticlepeer-review

  129. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  130. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Adjusted Viterbi training. Proof of Concept

    Lember, J. & Koloydenko, A., 2007, In: Probability in the Engineering and Informational Sciences. 21, 3, p. 451-475 25 p.

    Research output: Contribution to journalArticlepeer-review

  132. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  134. Published

    Advances in spatiotemporal models for non-communicable disease surveillance

    Blangiardo, M., Boulieri, A., Diggle, P., Piel, F. B., Shaddick, G. & Elliott, P., 1 Apr 2020, In: International Journal of Epidemiology. 49, p. I26-I37

    Research output: Contribution to journalArticlepeer-review

  135. Published

    Adversarial resilience of matchings in bipartite random graphs

    Balister, P., Gerke, S. & McDowell, A., 2 Dec 2016, In: Journal of Combinatorics. 8, 1, p. 79-92 14 p.

    Research output: Contribution to journalArticlepeer-review

  136. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  139. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Unpublished

    Algorithmic Algebraic Techniques and their Application to Block Cipher Cryptanalysis

    Albrecht, M., 2010, (Unpublished) 176 p.

    Research output: ThesisDoctoral Thesis

  142. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  143. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In: Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticlepeer-review

  144. Unpublished

    Algorithmic, probabilistic, and physics-inspired methods for cuts and shortest paths in graphs

    Mezei, B., 2020, (Unpublished) 143 p.

    Research output: ThesisDoctoral Thesis

  145. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Algorithms for generating convex sets in acyclic digraphs

    Balister, P., Gerke, S., Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., Dec 2009, In: Journal of Discrete Algorithms. 7, 4, p. 509–518 10 p.

    Research output: Contribution to journalArticlepeer-review

  147. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  148. Published

    Almost-primes in short intervals

    Harman, G., 1981, In: Mathematische Annalen. 258, p. 107-112 6 p.

    Research output: Contribution to journalArticlepeer-review

  149. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  150. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In: International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticlepeer-review

  151. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  154. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In: Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticlepeer-review

  155. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  158. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  159. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  161. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  162. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  165. Published
  166. Published

    An estimate for narrow operators on Lp([0,1])

    Shargorodsky, E. & Sharia, T., 5 Nov 2020, In: Archiv der Mathematik. 6 p.

    Research output: Contribution to journalArticlepeer-review

  167. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  168. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In: Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticlepeer-review

  170. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. E-pub ahead of print

    An Introduction to QBism with an Application to the Locality of Quantum Mechanics

    Fuchs, C. A., Mermin, N. D. & Schack, R., 22 Jul 2014, (E-pub ahead of print) In: American Journal of Physics. 82, 8, p. 749-754 6 p.

    Research output: Contribution to journalArticlepeer-review

  172. Published

    An Introduction to Quantum and Vassiliev Knot Invariants

    Moffatt, I. & Jackson, D. M., 19 Jun 2019, Springer International Publishing. 422 p. (CMS Books in Mathematics)

    Research output: Book/ReportBook

  173. Forthcoming

    An Irrational-slope Thompson's Group

    Burillo, J., Nucinkis, B. & Reeves, L., 1 Sep 2020, (Accepted/In press) In: Publicacions Matemàtiques .

    Research output: Contribution to journalArticlepeer-review

  174. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  175. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  176. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  177. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  178. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  179. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In: Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticlepeer-review

  180. Unpublished
  181. Published

    Analysis of integrated cross sections and spin asymmetries for the electron-impact ionization of one and two-electron atomic system

    Berekdar, J., buckman, S. J., O'Mahony, P. & Mota-Furtado, F., 1997, Coincidence Studies of Electron and Photon Impact Ionization. Whelan, C. T. & Walters, H. R. J. (eds.). Plenum, p. 65-69

    Research output: Chapter in Book/Report/Conference proceedingChapter

  182. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Analytic groups over general pro-p domains

    Jaikin-Zapirain, A. & Klopsch, B., Oct 2007, In: Journal of the London Mathematical Society. 76, p. 365-383 19 p.

    Research output: Contribution to journalArticlepeer-review

  184. Published

    Analytic pro-p groups of small dimensions

    González-Sánchez, J. & Klopsch, B., Apr 2009, In: Journal of Group Theory. 12, 5, p. 711-734 24 p.

    Research output: Contribution to journalArticlepeer-review

  185. Unpublished

    Analyzing and Developing Role-Based Access Control Models

    Chen, L., 2011, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  186. Unpublished

    Anonymity and Time in Public-Key Encryption

    Quaglia, E., 2012, (Unpublished) 166 p.

    Research output: ThesisDoctoral Thesis

  187. Unpublished

    Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks

    Malip, A., 2014, (Unpublished) 156 p.

    Research output: ThesisDoctoral Thesis

  188. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  190. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In: IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticlepeer-review

  191. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  194. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  195. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  196. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  197. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In: Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

  199. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In: Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticlepeer-review

  201. Published

    Approximate models for bacteria leaching through porous media

    Horgan, G., Molchanov, I., Shcherbakov, V. & Zuyev, S., 2007, In: Applied Mathematics and Computation. 188, p. 1941-1954 13 p.

    Research output: Contribution to journalArticlepeer-review

  202. Published

    Approximation of real matrices by integral matrices

    Harman, G., 1990, In: Journal of Number Theory. 34, p. 63-81 19 p.

    Research output: Contribution to journalArticlepeer-review

  203. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Area level deprivation and monthly COVID-19 cases: The impact of government policy in England

    Morrissey, K., Spooner, F., Salter, J. & Shaddick, G., Nov 2021, In: Social Science and Medicine. 289, 114413.

    Research output: Contribution to journalArticlepeer-review

  205. Unpublished

    Arithmetic groups, base change and representation growth

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2012, (Unpublished) In: Preprint.

    Research output: Contribution to journalArticlepeer-review

  206. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Asymmetric Exclusion Model and Weighted Lattice Paths

    Brak, R. & Essam, J. W., 9 Apr 2004, In: Journal of Physics A: Mathematical and General. 37, 14, p. 4183-4217

    Research output: Contribution to journalArticlepeer-review

  208. Published

    Asymptotic analysis of a particle system with mean-field interaction

    Manita, A. & Shcherbakov, V., 2005, In: Markov Processes and Related Fields. 11, 3, p. 489–518 29 p.

    Research output: Contribution to journalArticlepeer-review

  209. Published

    Asymptotic behavior of truncated stochastic approximation procedures

    Sharia, T. & Zhong, L., 26 May 2017, In: Mathematical Methods of Statistics. 26, 1, p. 37-54 18 p.

    Research output: Contribution to journalArticlepeer-review

  210. Published

    Asymptotic diophantine approximation: the multiplicative case

    Widmer, M., May 2017, In: Ramanujan Journal. 43, 1, p. 83-93 11 p.

    Research output: Contribution to journalArticlepeer-review

  211. Published

    Asymptotic Error Rates in Quantum Hypothesis Testing

    Audenaert, K. M. R., Nussbaum, M., Szkola, A. & Verstraete, F., Apr 2008, In: Communications in Mathematical Physics. 279, 1, p. 251-283

    Research output: Contribution to journalArticlepeer-review

  212. Published

    Asymptotic normality of the maximum likelihood estimator for cooperative sequential adsorption

    Penrose, M. D. & Shcherbakov, V., 2011, In: Advances in Applied Probability. 43, 3, p. 636-648

    Research output: Contribution to journalArticlepeer-review

  213. Published

    Asymptotic Relative Entropy of Entanglement for Orthogonally Invariant States

    Audenaert, K., De Moor, B., Vollbrecht, K-G. H. & Werner, R. F., 24 Apr 2002, In: Physical Review A. 66, p. 032310

    Research output: Contribution to journalArticlepeer-review

  214. Published

    Atoms in External Fields

    O'Mahony, P., 1988, Fundamental Processes in Atomic Dynamics. Briggs, J. S., Kleinpoppen, H. & Lutz, H. (eds.). New York: PLENUM PRESS DIV PLENUM PUBLISHING CORP, p. 197-216 (N.A.T.O. A.S.I. Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  215. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In: IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticlepeer-review

  216. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G., 2007, IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  217. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G., 2008, Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  219. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  221. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  222. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  223. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  224. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  226. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Autoantibodies in juvenile-onset myositis: Their diagnostic value and associated clinical phenotype in a large UK cohort

    on behalf of the JDRG, Nov 2017, In: Journal of Autoimmunity. 84, p. 55-64 10 p.

    Research output: Contribution to journalArticlepeer-review

  228. Published

    Automated multimodal spectral histopathology for quantitative diagnosis of residual tumour during basal cell carcinoma surgery

    Boitor, R., Kong, K., Shipp, D., Varma, S., Koloydenko, A. A., Kulkarni, K., Elsheikh, S., Schut, T., Caspers, P., Puppels, G., van der Wolf, M., Sokolova, E., Nijsten, T. E. C., Salence, B., Williams, H. & Notingher, I., 22 Nov 2017, In: Biomedical Optics Express. 8, 12, p. 5749-5766 18 p.

    Research output: Contribution to journalArticlepeer-review

  229. Published

    Automorphism groups of cyclic codes

    Bienert, R. & Klopsch, B., Feb 2010, In: Journal of Algebraic Combinatorics. 31, 1, p. 33-52 20 p.

    Research output: Contribution to journalArticlepeer-review

  230. Published

    Automorphisms of the Nottingham group

    Klopsch, B., 1 Jan 2000, In: Journal of Algebra. 223, 1, p. 37-56 20 p.

    Research output: Contribution to journalArticlepeer-review

  231. Published

    Average bounds for the ℓ-torsion in class groups of cyclic extensions

    Frei, C. & Widmer, M., 10 Aug 2018, In: Research in Number Theory. 4, p. 1-25 25 p., 34.

    Research output: Contribution to journalArticlepeer-review

  232. Published

    Averages and higher moments for the ℓ-torsion in class groups

    Frei, C. & Widmer, M., 23 Dec 2020, In: Mathematische Annalen. p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  233. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  235. Submitted

    Balls-in-bins models with asymmetric feedback and reflection

    Shcherbakov, V. & Menshikov, M., Apr 2022, (Submitted) 22 p.

    Research output: Working paper

  236. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  237. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticlepeer-review

  239. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Bell numbers, partition moves and the eigenvalues of the random-to-top shuffle in Dynkin Types A, B and D

    Britnell, J. R. & Wildon, M., May 2017, In: Journal of Combinatorial Theory, Series A. 148, p. 116-144 29 p.

    Research output: Contribution to journalArticlepeer-review

  241. Published

    Bertini and Northcott

    Pazuki, F. & Widmer, M., 25 Jan 2021, In: Research in Number Theory. 7, 18 p., 12.

    Research output: Contribution to journalArticlepeer-review

  242. Published

    Bicoloured Dyck paths and the contact polynomial for n non-intersecting paths in a half plane.

    Brak, R. & Essam, J. W., 12 Sep 2003, In: The Electronic Journal of Combinatorics. 10, 1, p. 1-18

    Research output: Contribution to journalArticlepeer-review

  243. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In: Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticlepeer-review

  244. Unpublished

    Bieri-Strebel Groups With Irrational Slopes

    Winstone, N., 2022, (Unpublished) 190 p.

    Research output: ThesisDoctoral Thesis

  245. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticlepeer-review

  246. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252

    Research output: Contribution to journalArticlepeer-review

  247. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252 22 p.

    Research output: Contribution to journalArticlepeer-review

  248. Published

    Block-avoiding point sequencings

    Blackburn, S. & Etzion, T., Jun 2021, In: Journal of Combinatorial Designs. 29, 6, p. 339-366 28 p.

    Research output: Contribution to journalArticlepeer-review

  249. Published

    Boolean Ring Cryptographic Equation Solving

    Murphy, S., Paterson, M. & Swart, C., 18 Sep 2020, Springer, p. 252-272, 21 p. (LNCS).

    Research output: Working paper

  250. Published

    Boundary effect in competition processes

    Shcherbakov, V. & Volkov, S., 1 Oct 2019, In: Journal of Applied Probability. 56, 3, p. 750-768 19 p.

    Research output: Contribution to journalArticlepeer-review

  251. Published

    Boundary effects in large deviation problems

    Ignatiouk-Robert, I., Malyshev, V. & Shcherbakov, V., 1994, In: Russian Mathematical Surveys. 49, 2, p. 41–99 58 p.

    Research output: Contribution to journalArticlepeer-review

  252. Published

    Bounding the orders of finite subgroups

    Leary, I. & Nucinkis, B., 2001, In: Publicacions Matematiques. 45, p. 259-264

    Research output: Contribution to journalArticlepeer-review

  253. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In: Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticlepeer-review

  254. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In: The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticlepeer-review

  255. Published

    Bounds for the ℓ‐torsion in class groups

    Widmer, M., Feb 2018, In: Bulletin of the London Mathematical Society. 50, 1, p. 124-131 8 p.

    Research output: Contribution to journalArticlepeer-review

  256. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticlepeer-review

  257. Published

    Branch groups, orbit growth, and subgroup growth types for pro-p groups

    Barnea, Y. & Schlage-Puchta, J-C., 26 May 2020, In: Forum of Mathematics, Pi. 8, p. 1-26 26 p., e10.

    Research output: Contribution to journalArticle

  258. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Bredon cohomological finiteness conditions for generalisations of Thompson's groups

    Martinez-Perez, C. & Nucinkis, B., 2013, In: Groups, Geometry, and Dynamics. 7, 4

    Research output: Contribution to journalArticlepeer-review

  260. Published

    Bridging Viterbi and Posterior Decoding: A Generalized Risk Approach to Hidden Path Inference Based on Hidden Markov Models

    Lember, J. & Koloydenko, A. A., Jan 2014, In: Journal of Machine Learning Research. 15, p. 1-58 58 p.

    Research output: Contribution to journalArticlepeer-review

  261. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  262. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  263. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  264. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S., 2009, ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  265. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  268. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, (E-pub ahead of print) 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Capabilities of a Perturbed Toric Code as a Quantum Memory

    Kay, A., 29 Dec 2011, In: Physical Review Letters. 107, 27, 5 p., 270502.

    Research output: Contribution to journalArticlepeer-review

  270. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  273. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  275. Published

    Centralisers of finite subgroups in soluble groups of type $FP_n$

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2011, In: Forum Mathematicum.

    Research output: Contribution to journalArticlepeer-review

  276. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  277. Published

    Certificateless Encryption Schemes Strongly Secure in the Standard Model

    Dent, A. W., Libert, B. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  278. Published

    Certificateless public key cryptography

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. Asiacrypt 2003. Laih, C. S. (ed.). p. 452-473 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  279. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In: Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticlepeer-review

  280. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, In: IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticlepeer-review

  281. Published

    Challenging the adversary model in secret sharing schemes

    Martin, K. M., 2008, Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts. p. 45-63 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  282. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587. p. 177-191 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  283. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In: Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticlepeer-review

  284. Published

    Channel Assignment with Large Demands

    Gerke, S. & McDiarmid, C., 2001, In: Annals of Operations Research. 107, 1-4, p. 143-159 17 p.

    Research output: Contribution to journalArticlepeer-review

  285. Published

    Channel coupling in the 1 D e spectrum of beryllium

    O'Mahony, P. F. & Watanabe, S., 1985, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 18, 9, p. L239

    Research output: Contribution to journalArticlepeer-review

  286. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticlepeer-review

  287. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In: Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticlepeer-review

  288. Published

    Character values and decomposition matrices of symmetric groups

    Wildon, M., 2008, In: Journal of Algebra. 319, 8, p. 3382-3397 16 p.

    Research output: Contribution to journalArticlepeer-review

  289. Published

    Characterising the Performance of XOR Games and the Shannon Capacity of Graphs

    Ramanathan, R., Kay, A., Murta, G. & Horodecki, P., 8 Dec 2014, In: Physical Review Letters. 113, 24, p. 1-5 5 p., 240401 .

    Research output: Contribution to journalArticlepeer-review

  290. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Classical and quantum threshold laws in 3-body Coulomb breakup

    Chocian, P., Ihra, W. & O'Mahony, P. F., 2000, In: Physics Essays. 13, 2-3, p. 394-399 6 p.

    Research output: Contribution to journalArticlepeer-review

  292. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticlepeer-review

  293. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  294. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In: Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticlepeer-review

  295. Published

    Classification framework for fair content tracing protocols

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 8th International Workshop (IWDW 2009). Springer, Vol. 5703. p. 252-267 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  296. Unpublished

    Classifying spaces for chains of families of subgroups

    Moreno, V., 2018, (Unpublished) 106 p.

    Research output: ThesisDoctoral Thesis

  297. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  299. Published

    Clinical Integration of Fast Raman spectroscopy for Mohs micrographic surgery of basal cell carcinoma

    Boitor, R., de Wolf, C., Weesie, F., Shipp, D., Varma, S., Veitch, D., Wernham, A., Koloydenko, A., Puppels, G., Nijsten, T., Williams, H. C., Caspers, P. & Notingher, I., 11 Mar 2021, In: Biomedical Optics Express. 12, 4, p. 2015-2026 12 p.

    Research output: Contribution to journalArticlepeer-review

  300. Published

    Clinical translation of Raman-based multimodal spectral histopathology for margin assessment during surgery of basal cell carcinoma

    Boitor, R., Kong, K., Varma, S., Koloydenko, A., Williams, H. & Notingher, I., 22 Jul 2019, Proceedings SPIE, Medical Laser Applications and Laser-Tissue Interactions IX, 110790G . SPIE - INT SOC OPTICAL ENGINEERING, Vol. 11079. p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Clock trees: logical clocks for programs with nested parallelism

    Audenaert, K., 1997, In: Software Engineering, IEEE Transactions on. 23, 10, p. 646-658 13 p.

    Research output: Contribution to journalArticlepeer-review

  302. Published

    Clock-controlled Pseudorandom Generators on Finite Groups

    Baum, U. & Blackburn, S. R., 1995, Fast Software Encryption, 2nd International Workshop, Leuven, Belgium. Preneel, B. (ed.). Berlin: Springer, p. 6-21 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  303. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  304. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Coding Techniques for Power Controlled OFDM

    Paterson, K. G., 1998, Proceedings of 9th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98). IEEE Computer Society Press, Vol. 2. p. 801-805 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  306. Published

    Cognitive remediation therapy (CRT) in a specialist inpatient eating disorder service for children and adolescents: CAN‐CRT study protocol for a pilot randomised controlled trial

    Giombini, L., Nesbitt, S., Cox, H., Foxall, A., Sharia, T., Easter, A. & Tchanturia, K., Sep 2018, In: European Eating Disorders Review. 26, 5, p. 438-446 9 p.

    Research output: Contribution to journalArticlepeer-review

  307. Published

    Coherent Quantum Transport in Photonic Lattices

    Perez-Leija, A., Keil, R., Kay, A., Moya-Cessa, H., Nolte, S., Kwek, L-C., M. Rodríguez-Lara, B., Szameit, A. & N. Christodoulides, D., Jan 2013, In: Physical Review A. 87, 012309.

    Research output: Contribution to journalArticlepeer-review

  308. Published

    Cohomological dimension of Mackey functors for infinite groups.

    Martinez-Perez, C. & Nucinkis, B., 2006, In: Journal of the London Mathematical Society. 74, 2, p. 379–396

    Research output: Contribution to journalArticlepeer-review

  309. Published

    Cohomological finiteness conditions and centralisers in generalisations of Thompson's group V

    Martinez-Perez, C., Matucci, F. & Nucinkis, B., 1 Sep 2016, In: Forum Mathematicum. 28, 5, p. 909-921 13 p.

    Research output: Contribution to journalArticlepeer-review

  310. Published

    Cohomological finiteness conditions for elementary amenable groups

    Kropholler, P. H., Martinez-Perez, C. & Nucinkis, B. E. A., 2009, In: Journal für die reine und angewandte Mathematik. 637, p. 49-62 13 p.

    Research output: Contribution to journalArticlepeer-review

  311. Published

    Cohomological finiteness conditions in Bredon cohomology

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2011, In: Bulletin of the London Mathematical Society.

    Research output: Contribution to journalArticlepeer-review

  312. Published

    Cohomological finiteness properties of the Brin-Thompson-Higman groups 2V and 3V

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2013, In: Proceedings of the Edinburgh Mathematical Society (Series 2). 56, 03, p. 777-804 28 p.

    Research output: Contribution to journalArticlepeer-review

  313. Unpublished

    Cohomology of Profinite Groups

    Corob Cook, G., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  314. Published

    Cohomology relative to a G-set and finiteness conditions.

    Nucinkis, B., 1999, In: Topology Appl.. 92, 2, p. 153–171

    Research output: Contribution to journalArticlepeer-review

  315. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Colouring weighted bipartite graphs with a co-site constraint

    Gerke, S., 28 Sep 2000, In: Discrete Mathematics. 224, 1-3, p. 125-138 14 p.

    Research output: Contribution to journalArticlepeer-review

  317. Published

    Combatting the Effects of Disorder in Quantum State Transfer

    Keele, C. & Kay, A., 24 Mar 2022, 032612 ed., Physical Review A.

    Research output: Working paperPreprint

  318. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  319. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  320. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  321. Published

    Comment on "Adiabatic quantum computation with a one-dimensional projector Hamiltonian"

    Kay, A., 2013, In: Physical Review A. 88, 046301.

    Research output: Contribution to journalArticlepeer-review

  322. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  323. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  324. Published

    Comment on "Optimum Quantum Error Recovery using Semidefinite Programming"

    Reimpell, M., Werner, R. F. & Audenaert, K., 7 Jun 2006, Unkown Publisher.

    Research output: Book/ReportOther report

  325. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  326. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In: Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  327. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In: Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  328. Published

    Comments on "On the Security of Three-Party Cryptographic Protocols" by Xu, Zhang and Zhu.

    Ng, S-L., 1999, In: Operating Systems Review. 33, 3, p. 5-6

    Research output: Contribution to journalComment/debate

  329. Published

    Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al.

    Chen, L. & Ng, S-L., 2010, In: IEEE Transaction on Vehicular Technology. 59, 3, p. 1503-1505 3 p.

    Research output: Contribution to journalComment/debatepeer-review

  330. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In: IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debatepeer-review

  331. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  332. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In: IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  333. Published

    Commuting conjugacy classes: an application of Hall's marriage theorem to group theory

    Britnell, J. R. & Wildon, M., 2009, In: Journal of Group Theory. 12, 6, p. 795-802 8 p.

    Research output: Contribution to journalArticlepeer-review

  334. Published

    Comparisons between quantum state distinguishability measures

    Audenaert, K., 2014, In: Quantum Inf. Comput.. 14, 1&2, p. 31-38

    Research output: Contribution to journalArticlepeer-review

  335. Published

    Complete Bredon cohomology and its applications to hierarchically defined groups

    Nucinkis, B. & Petrosyan, N., Jul 2016, In: Mathematical Proceedings of the Cambridge Philosophical Society. 161, 1, p. 143-156 14 p.

    Research output: Contribution to journalArticlepeer-review

  336. Published

    Complete cohomology for arbitrary rings using injectives.

    Nucinkis, B., 1998, In: Journal of Pure and Applied Algebra. 131, 3, p. 297–318

    Research output: Contribution to journalArticlepeer-review

  337. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In: EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  338. Published

    Computation on spin chains with limited access

    Kay, A. & Pemberton-Ross, P. J., Jan 2010, In: Physical Review A. 81, 1, p. - 4 p., 010301.

    Research output: Contribution to journalArticlepeer-review

  339. Published

    Computational and Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2004, Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC 2004. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Computing division polynomials

    McKee, J., 1994, In: Mathematics of Computation. 63, p. 767-771

    Research output: Contribution to journalArticlepeer-review

  341. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  342. Published

    Computing totally positive algebraic integers of small trace

    McKee, J., Apr 2011, In: Mathematics of Computation. 80, 274, p. 1041 1052 p.

    Research output: Contribution to journalArticlepeer-review

  343. Published

    Concurrent Signatures

    Chen, L., Kudla, C. J. & Paterson, K. G., 2004, Proc. Eurocrypt 2004. Cachin, C. & Camenisch, J. (eds.). Springer, p. 287-305 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  344. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  345. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  346. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  347. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  348. Published

    Conjugate algebraic numbers on conics: a survey

    McKee, J., 2008, Number Theory and Polynomials. McKee, J. & Smyth, C. (eds.). Cambridge University Press, p. 211-240 (LMS Lecture Note Series; vol. 352).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  349. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Connectivity of addable graph classes

    Balister, P., Bollobás, B. & Gerke, S., May 2008, In: Journal of Combinatorial Theory, Series B. 98, 3, p. 577-584 8 p.

    Research output: Contribution to journalArticlepeer-review

  351. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  352. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  353. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  355. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Constructing k-radius sequences

    R. Blackburn, S. & F. McKee, J., Oct 2012, In: Mathematics of Computation. 81, 280, p. 2439-2459

    Research output: Contribution to journalArticlepeer-review

  357. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  358. Published

    Continuity bounds on the quantum relative entropy

    Audenaert, K. M. R. & Eisert, J., 29 Mar 2005, In: Journal of Mathematical Physics. 46, p. 102104

    Research output: Contribution to journalArticlepeer-review

  359. Published

    Continuity bounds on the quantum relative entropy - II

    Audenaert, K. & Eisert, J., Nov 2011, In: Journal of Mathematical Physics. 52, 7 p., 112201.

    Research output: Contribution to journalArticlepeer-review

  360. Published

    Continuous stochastic Schrödinger equations and localization

    Rigo, M., Mota-Furtado, F. & O'Mahony, P. F., 1997, In: Journal of Physics A: Mathematical and General. 30, 21, p. 7557

    Research output: Contribution to journalArticlepeer-review

  361. Published

    Continuum spectrum of an atom or molecule in a magnetic field

    O'Mahony, P. & Mota-Furtado, F., 21 Oct 1991, In: Physical Review Letters. 67, 17, p. 2283-2286 4 p.

    Research output: Contribution to journalArticlepeer-review

  362. Published

    Controllability and matchings in random bipartite graphs

    Balister, P. & Gerke, S., Jul 2015, Surveys in Combinatorics 2015. Czumaj, A., Georgakopoulos, A., Král, D., Lozin, V. & Pikhurko, O. (eds.). Cambridge University Press, Vol. 424. p. 119-146 28 p. (London Mathematical Society Lecture Note Series; vol. 424).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  363. Published

    Convex Sets in Acyclic Digraphs

    Balister, P., Gerke, S. & Gutin, G., Mar 2009, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 26, 1, p. 95-100 6 p.

    Research output: Contribution to journalArticlepeer-review

  364. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Coprocessors for quantum devices

    Kay, A., 15 Mar 2018, In: Physical Review A. 97, 3, p. 1-11 11 p., 032316.

    Research output: Contribution to journalArticlepeer-review

  366. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  367. Published

    Counting lattice points and o-minimal structures

    Barroero, F. & Widmer, M., 10 Jun 2013, In: International Mathematics Research Notices.

    Research output: Contribution to journalArticlepeer-review

  368. Published

    Counting lattice points and weak admissibility of a lattice and its dual

    Technau, N. & Widmer, M., 2 Sep 2020, In: Israel Journal of Mathematics. p. 1-19 19 p.

    Research output: Contribution to journalArticlepeer-review

  369. Published

    Counting partitions on the abacus

    Wildon, M., 2008, In: Ramanujan Journal. 17, 3, p. 355-367 13 p.

    Research output: Contribution to journalArticlepeer-review

  370. Published

    Counting points of fixed degree and bounded height

    Widmer, M., 2009, In: Acta Arithmetica. 140, 2

    Research output: Contribution to journalArticlepeer-review

  371. Published

    Counting points of fixed degree and bounded height on linear varieties

    Widmer, M., 2010, In: Journal of Number Theory. 130, 8

    Research output: Contribution to journalArticlepeer-review

  372. Published

    Counting points of fixed degree and given height over function fields

    Thunder, J. L. & Widmer, M., 2013, In: Bulletin of the London Mathematical Society. 45, 2, p. 283-300 24 p.

    Research output: Contribution to journalArticlepeer-review

  373. Published

    Counting primes whose sum of digits is prime

    Harman, G., 2012, In: Journal of Integer Sequences. 15, p. 1 7 p., 12.2.2.

    Research output: Contribution to journalArticlepeer-review

  374. Published

    Counting primitive points of bounded height

    Widmer, M., Sep 2010, In: Transactions of the American Mathematical Society. 362, 9, p. 4793-4829 38 p.

    Research output: Contribution to journalArticlepeer-review

  375. Published

    Coverage of the whole space

    Molchanov, I. & Shcherbakov, V., 2003, In: Advances in Applied Probability. 35, 4, p. 898–912 14 p.

    Research output: Contribution to journalArticlepeer-review

  376. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  377. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  378. Published

    Critical growth of a semilinear process

    Molchanov, I., Shcherbakov, V. & Zuyev, S., 2004, In: Journal of Applied Probability. 41, 2, p. 355–367 12 p.

    Research output: Contribution to journalArticlepeer-review

  379. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  381. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In: IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticlepeer-review

  382. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  383. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  384. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  385. Published

    Cryptanalysis of a message authentication code due to Cary and Venkatesan

    Blackburn, S. R. & Paterson, K. G., 2004, Fast Software Encryption 2004. Roy, B. & Meier, W. (eds.). Berlin: Springer, p. 446-453 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  386. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  387. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In: IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticlepeer-review

  388. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  389. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In: Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticlepeer-review

  390. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  391. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  392. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  394. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published
  396. Published

    Cryptography from Pairings

    Paterson, K. G., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  397. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In: Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticlepeer-review

  398. Published

    Cryptography in theory and practice: The case of encryption in IPsec

    Paterson, K. G. & Yau, A. K. L., 2006, Eurocrypt 2006. Vaudenay, S. (ed.). Springer, p. 12-29 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  399. Published

    Cubic forms modulo one

    Dietmann, R., 2004, In: Bulletin of the London Mathematical Society. 36, 2, p. 198-204 7 p.

    Research output: Contribution to journalArticlepeer-review

  400. Published

    Cumulative Arrays and Geometric Secret Sharing Schemes

    Jackson, W-A. & Martin, K. M., 1993, Advances in Cryptology: Auscrypt '92. Springer, Vol. 718. p. 48-55 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  401. Unpublished

    Cyclotomic Matrices over Quadratic Integer Rings

    Greaves, G., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  402. Published

    Cyclotomic matrices over real quadratic integer rings

    Greaves, G., 1 Nov 2012, In: Linear Algebra and Its Applications. 437, 9, p. 2252-2261 10 p.

    Research output: Contribution to journalArticlepeer-review

  403. Published

    Cyclotomic matrices over the Eisenstein and Gaussian integers

    Greaves, G., 15 Dec 2012, In: Journal of Algebra. 372, p. 560-583 24 p.

    Research output: Contribution to journalArticlepeer-review

  404. Published

    Data Integration for the Assessment of Population Exposure to Ambient Air Pollution for Global Burden of Disease Assessment

    Shaddick, G., Thomas, M. L., Amini, H., Broday, D., Cohen, A., Frostad, J., Green, A., Gumy, S., Liu, Y., Martin, R. V., Pruss-Ustun, A., Simpson, D., Van Donkelaar, A. & Brauer, M., 21 Aug 2018, In: Environmental Science and Technology. 52, 16, p. 9069-9078 10 p.

    Research output: Contribution to journalArticlepeer-review

  405. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  407. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In: Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticlepeer-review

  409. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticlepeer-review

  410. Published

    Decoherence-assisted transport in quantum networks

    Marais, A., Sinayskiy, I., Kay, A., Petruccione, F. & Ekert, A., 26 Jan 2014, In: New Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  411. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Deformations and rigidity of lattices in solvable Lie groups

    Baues, O. & Klopsch, B., 2013, In: Journal of Topology.

    Research output: Contribution to journalArticlepeer-review

  413. Published

    Degree of quantum correlation required to speed up a computation

    Kay, A., 14 Dec 2015, In: Physical Review A. 92, 6, p. 1-7 7 p., 062329.

    Research output: Contribution to journalArticlepeer-review

  414. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2008, In: International Journal of Information Security. 7, 2, p. 123-136 14 p.

    Research output: Contribution to journalArticlepeer-review

  418. Published

    Delta-matroids for graph theorists

    Moffatt, I., 2019, Surveys in combinatorics 2019. Cambridge University Press, p. 167-220 (London Math. Soc. Lecture Note Ser.; vol. 446).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  419. Published

    Deniable authenticated key establishment for Internet protocols

    Boyd, C., Mao, W. & Paterson, K. G., 2005, Security Protocols, 11th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, p. 255-271 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  420. Published

    Density of Skew Brownian motion and its functionals with application in finance

    Gairat, A. & Shcherbakov, V., Oct 2017, In: Mathematical Finance. 27, 4, p. 1069-1088 20 p.

    Research output: Contribution to journalArticlepeer-review

  421. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  422. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In: International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticlepeer-review

  423. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Development of Raman microspectroscopy for automated detection and imaging of basal cell carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Perkins, W., Koloydenko, A., Williams, H., Notingher, I., Leach, I. & Varma, S., 2009, In: Journal of Biomedical Optics. 14, p. 054031 1 p.

    Research output: Contribution to journalArticlepeer-review

  428. Published

    Diagnosis of tumors during tissue-conserving surgery with integrated autofluorescence and Raman scattering microscopy

    Kong, K., Rowlands, C., Varma, S., Perkins, W., Leach, I., Koloydenko, A., Williams, H. & Notingher, I., 17 Sep 2013, In: Proceedings of the National Academy of Sciences of the United States of America. 110, 38, p. 15189-15194 6 p.

    Research output: Contribution to journalArticlepeer-review

  429. Published

    Dietary shifts can reduce premature deaths related to particulate matter pollution in China

    Liu, X., Tai, A. P. K., Chen, Y., Zhang, L., Shaddick, G., Yan, X. & Lam, H. M., Dec 2021, In: Nature Food. 2, 12, p. 997-1004 8 p.

    Research output: Contribution to journalArticlepeer-review

  430. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  432. Published

    Diophantine approximation by prime numbers

    Harman, G., 1991, In: Journal of the London Mathematical Society. 44, p. 218-226 9 p.

    Research output: Contribution to journalArticlepeer-review

  433. Published

    Diophantine approximation by prime numbers

    Harman, G. & Baker, R. C., 1982, In: Journal of the London Mathematical Society. 25, p. 201-215 15 p.

    Research output: Contribution to journalArticlepeer-review

  434. Published

    Diophantine approximation with a prime and an almost-prime

    Harman, G., 1984, In: Journal of the London Mathematical Society. 29, p. 13-22 10 p.

    Research output: Contribution to journalArticlepeer-review

  435. Published

    Diophantine approximation with almost-primes and sums of two squares

    Harman, G., 1985, In: Mathematika. 32, p. 301-310 10 p.

    Research output: Contribution to journalArticlepeer-review

  436. Published

    Diophantine approximation with mild divisibility constraints

    Harman, G., Alkan, E. & Zaharescu, A., 2006, In: Journal of Number Theory. 118, p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  437. Published

    Diophantine approximation with multiplicative functions

    Harman, G., 2010, In: Monatshefte für Mathematik. 160, p. 51-57 7 p.

    Research output: Contribution to journalArticlepeer-review

  438. Published

    Diophantine approximation with square-free integers

    Harman, G., 1984, In: Math. Proc. Cambridge Phil. Soc.. 95, p. 381-388 8 p.

    Research output: Contribution to journalArticlepeer-review

  439. Published

    Diophantine inequalities with mixed powers

    Harman, G. & Baker, R. C., 1984, In: Journal of Number Theory. 18, p. 69-85 17 p.

    Research output: Contribution to journalArticlepeer-review

  440. Published

    Directed compact percolation near a wall: III. Exact results for the mean length and number of contacts

    Brak, R. & Essam, J. W., 15 Jan 1999, In: Journal of Physics A: Mathematical and General. 32, 2, p. 355-367

    Research output: Contribution to journalArticlepeer-review

  441. Published

    Discrepancy estimates for the value distribution of the Riemann zeta-function

    Harman, G. & Matsumoto, K., 1994, In: Journal of the London Mathematical Society. 50, p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review

  442. E-pub ahead of print

    Discrete SIR model on a homogeneous tree and its continuous limit

    Gairat, A. & Shcherbakov, V., 29 Sep 2022, (E-pub ahead of print) In: Journal of Physics A: Mathematical and Theoretical. 18 p.

    Research output: Contribution to journalArticlepeer-review

  443. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Discriminating States: the quantum Chernoff bound.

    Audenaert, K. M. R., Calsamiglia, J., Muñoz-Tapia, R., Bagan, E., Masanes, L., Acin, A. & Verstraete, F., 2007, In: Physical Review Letters. 98, 16, p. 160501 4 p.

    Research output: Contribution to journalArticlepeer-review

  445. Published

    Discrimination between basal cell carcinoma and hair follicles in skin tissue sections by Raman micro-spectroscopy

    Larraona-Puy, M., Ghita, A., Zoladek, A., Varma, S., Koloydenko, A., Perkins, W., Leach, I., Williams, H. & Notingher, I., 2011, In: Journal of Molecular Structure. 993, 1, p. 57-61 5 p.

    Research output: Contribution to journalArticlepeer-review

  446. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticlepeer-review

  447. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In: IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticlepeer-review

  448. Published

    Distributed Certificate Authority in cluster-based ad hoc networks

    Martin, K. M. & Chaddoud, G., 2006, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking. p. 278-283

    Research output: Chapter in Book/Report/Conference proceedingChapter

  449. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In: Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticlepeer-review

  451. Published

    Distribution of Fano parameters in a mesoscopic system with broken time-r reversal symmetry

    Uski, V., Mota-Furtado, F. & O'Mahony, P. F., 1 Jun 2007, In: Journal of Physics A: Mathematical and Theoretical. 40, 22, p. 5857-5864 8 p.

    Research output: Contribution to journalArticlepeer-review

  452. Published

    DNA origami and the complexity of Eulerian circuits with turning costs

    A. Ellis-Monaghan, J., McDowell, A., Moffatt, I. & Pangborn, G., Sep 2015, In: Natural Computing. 14, 3, p. 491–503 13 p.

    Research output: Contribution to journalArticlepeer-review

  453. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Double scattering in energy-sharing (e, 2e) reactions

    Furtado, F. M. & O'Mahony, P. F., 1989, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 22, 23, p. 3925

    Research output: Contribution to journalArticlepeer-review

  455. Published

    Doubly excited states of beryllium and magnesium

    O'Mahony, P. F. & Greene, C. H., 1 Jan 1985, In: Physical Review A. 31, 1, p. 250-259

    Research output: Contribution to journalArticlepeer-review

  456. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  457. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M., 2005, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  458. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  459. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In: J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticlepeer-review

  460. Published

    Early response to anti-TNF predicts long-term outcomes including sustained remission: An analysis of the BSRBR-RA

    Hamann, P. D. H., Pauling, J. D., McHugh, N., Hyrich, K. & Shaddick, G., 1 Jul 2020, In: Rheumatology (United Kingdom). 59, 7, p. 1709-1714 6 p.

    Research output: Contribution to journalArticlepeer-review

  461. Published

    Edge colourings and topological graph polynomials

    Ellis-Monaghan, J. A., Kauffman, L. H. & Moffatt, I., Oct 2018, In: Australasian Journal of Combinatorics. 72, 2, p. 290-305 16 p.

    Research output: Contribution to journalArticlepeer-review

  462. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G., 2008, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  463. Published

    Effect of anti-TNF and conventional synthetic disease-modifying anti-rheumatic drug treatment on work disability and clinical outcome in a multicentre observational cohort study of psoriatic arthritis

    Tillett, W., Shaddick, G., Jobling, A., Askari, A., Cooper, A., Creamer, P., Clunie, G., Helliwell, P. S., James, J., Kay, L., Korendowych, E., Lane, S., Packham, J., Shaban, R., Thomas, M. L., Williamson, L. & McHugh, N., 1 Apr 2017, In: Rheumatology (United Kingdom). 56, 4, p. 603-612 10 p., kew433.

    Research output: Contribution to journalArticlepeer-review

  464. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In: Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticlepeer-review

  465. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) p. 226-229. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  467. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  468. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticlepeer-review

  469. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  470. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In: IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticlepeer-review

  471. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  472. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaperpeer-review

  473. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  474. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  475. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  476. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  477. Published

    Efficient On-Line Estimation of Autoregressive Parameters

    Sharia, T. ., 2010, In: Mathematical Methods of Statistics. 19, 2, p. 163-186 24 p.

    Research output: Contribution to journalArticlepeer-review

  478. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  479. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticlepeer-review

  481. Unpublished

    Efficient time propagation techniques for few-body quantum systems

    Frapacinni, A., Hamido, A., Schröter, S., Madronero, J., Eiglsperger, J., Mota-Furtado, F., O'Mahony, P., Hervieux, P-A. & Piraux, B., 2012, (Unpublished) In: Central European Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  482. Published

    Eigenfunctions and matrix elements for a class of eigenvalue problems with staggered ladder spectra

    Mota-Furtado, F. & O'Mahony, P. F., Oct 2006, In: Physical Review A. 74, 4, 4 p., 044102.

    Research output: Contribution to journalArticlepeer-review

  483. Published

    Electron correlations in atomic valence shells: Magnesium and aluminum

    O'Mahony, P. F., 1 Aug 1985, In: Physical Review A. 32, 2, p. 908-916

    Research output: Contribution to journalArticlepeer-review

  484. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  485. E-pub ahead of print

    Endomorphism algebras of 2-row permutation modules in characteristic 3

    Kochhar, J., 8 Oct 2019, (E-pub ahead of print) In: Journal of Algebra.

    Research output: Contribution to journalArticlepeer-review

  486. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaperpeer-review

  489. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Entanglement Cost under Positive-Partial-Transpose-Preserving Operations

    Audenaert, K., Plenio, M. & Eisert, J., 2003, In: Physical Review Letters. 90, 2, p. 027901 4 p.

    Research output: Contribution to journalArticlepeer-review

  492. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K. & Plenio, M., 2007, Quantum Information Processing with Continuous Variables. Leuchs, G., Polzik, E. & Cerf, N. (eds.). London: Imperial College Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  493. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K., Cramer, M., Eisert, J. & Plenio, M. B., 2006, Proc. 1st Intl. Conf. on “Quantum Computing: Back Action 2006”, Kanpur, India..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Entanglement on mixed stabilizer states: normal forms and reduction procedures

    Audenaert, K. M. R. & Plenio, M. B., 2005, In: New Journal of Physics. 7, 1, p. 170

    Research output: Contribution to journalArticlepeer-review

  495. Published

    Entanglement Properties of the Harmonic Chain

    Audenaert, K., Eisert, J., Plenio, M. B. & Werner, R. F., 6 May 2002, In: Physical Review A. 66, p. 042327

    Research output: Contribution to journalArticlepeer-review

  496. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In: Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticlepeer-review

  497. Published

    Entanglement Rates and the Stability of the Area Law for the Entanglement Entropy

    Marien, M., Audenaert, K., Van Acoleyen, K. & Verstraete, F., Aug 2016, In: Communications in Mathematical Physics. 346, p. 35–73 39 p.

    Research output: Contribution to journalArticlepeer-review

  498. Published

    Entanglement scaling in lattice systems

    Audenaert, K. M. R., Cramer, M., Eisert, J. & Plenio, M. B., 2007, In: Journal of Physics: Conference Series. 67, 1

    Research output: Contribution to journalArticlepeer-review

  499. Published

    Entropy power inequalities for qudits

    Audenaert, K., Datta, N. & Ozols, M., 20 May 2016, In: Journal of Mathematical Physics. 57, 5, p. 1-27 27 p.

    Research output: Contribution to journalArticlepeer-review

  500. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 Next